Professional Documents
Culture Documents
17. Work created by inventors, authors and 24. Exclusive rights of authors and artists to
artists. Any product of human intellect that is duplicate, publish, and sell their material,
unique protecting
and unobvious with some value in the market any tangible form of expression.
place. A. Intellectual Property Right
A. Intellectual Property Right B. Intellectual Property
B. Intellectual Property C. Copyright Act
C. Copyright Act D. Trademark Law
D. Trademark Law
25. Protection of a company’s logos and brand
18. Laws that covers ideas, inventions, literary names.
creations, unique names, business models, A. Intellectual Property Right
industrial processors, computer program B. Intellectual Property
codes. C. Copyright Act
A. Intellectual Property Right D. Trademark Law
B. Copyright Act
C. Trademark Law
D. Intellectual Property Law 26. A node on a network can be a
______________
AVR
19. This Act provides the environment for the A. Computer
future development and delivery of healthcare B. User
in Malaysia. C. Router
A. Digital Signature Act 1997 D. Mouse
B. Computer Crime Act 1997
C. Telemedicine Act 1997 27. Of the three types of network, the
D. Computer Hackers 1997 _____________ covers the smallest area.
LAN
20. Which of the following is not in the A. MAN
Malaysia’s Cyber Laws? B. WAN
A. Digital Signature Act 1997 C. Internet
B. Computer Crime Act 1995 D. TAN
C. Telemedicine Act 1997
D. Computer Hackers Act 1997 28. In your school computer lab,
__________________ is commonly shared.
21. The Electronic Government Bill is drafted to A. Hard disk
enforce electronic dealings between the B. Processor
government and the public. C. RAM
A. TRUE D. Software
B. FALSE
29. ____________ refers to the way a network
22. The _________ is needed to secure is laid out.
electronic communications especially on the A. Access method
Internet. B. Addressing
A. Digital Signature Act 1997 C. Formatting
B. Computer Crime Act 1997 D. Topology
C. Communications and Multimedia Act 1998
D. Digital Mobile Act 1997
A. Robotic
30. Choose the correct diagram that shows B. Telemedicine
star topology. C. Neural network
.A. C. D. Computeraided manufacturing
36. ________ refers to the use of computers to 43. Data Backup is ___________________
assist healthcare professionals in different A. used to store files.
locations to conduct live conference using the B. a programme of file duplication.
computer.
C. a computer virus found on storage 48. People go to government websites for the
media. following purposes, EXCEPT to ___________
D. a copy of information that helps in A. read online newspaper.
losing a file. B. check for MyKad status.
C. check information on taxes.
D. register online for IPTA/IPTS
44. In the process of installing new software, application.
the installation automatically restarts the
computer 49. Which one of these is similar to a byte?
after prompting the user. This is A. 8 bits
called______________________ . B. 1 Megabyte(MB)
A cold boot C. 1 Terabyte (TB)
B install boot D. 1 Gigabyte(GB)
C warm boot
D software boot 50. A user is turning on a computer that has
been completely powered off. The user is
45. An antivirus program protects a computer performing a_________________ .
against viruses by A reboot
_________________________. B hot boot
A. reading the operating system and C cold boot
modifies it. D warm boot
B. installing a new virus through the
data received.
C. communicating and passing the
information to the outsider.
D. identifying and removing any
computer viruses found on storage
media, in the computer memory or
incoming email files.
Checked by;
……………………
Mr. Henry Ho
Head of Vocational & Technical Department
Prepared by;
………………………….
Mr. Taufik Hidayat bin Hamid
Head of ICT Department
46. ________ is able to damage a program
and infects the way the computer works.
A. A sudo
B. A virus
C. A system
D. A libwrap